咨询与建议

限定检索结果

文献类型

  • 832 篇 会议
  • 653 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,508 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 997 篇 工学
    • 781 篇 计算机科学与技术...
    • 663 篇 软件工程
    • 165 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 91 篇 生物工程
    • 82 篇 电气工程
    • 64 篇 生物医学工程(可授...
    • 63 篇 机械工程
    • 63 篇 电子科学与技术(可...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 28 篇 交通运输工程
    • 23 篇 动力工程及工程热...
  • 449 篇 理学
    • 267 篇 数学
    • 108 篇 生物学
    • 101 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 41 篇 化学
  • 276 篇 管理学
    • 188 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 54 篇 医学
    • 49 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 13 篇 农学
  • 12 篇 军事学
  • 11 篇 教育学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 39 篇 computer science
  • 33 篇 computational mo...
  • 32 篇 machine learning
  • 31 篇 semantics
  • 31 篇 training
  • 29 篇 software enginee...
  • 28 篇 data mining
  • 28 篇 feature extracti...
  • 26 篇 software
  • 25 篇 accuracy
  • 21 篇 deep learning
  • 21 篇 predictive model...
  • 19 篇 testing
  • 18 篇 convolution
  • 18 篇 authentication
  • 17 篇 analytical model...
  • 17 篇 cloud computing
  • 16 篇 artificial intel...
  • 14 篇 conferences
  • 14 篇 optimization

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 98 篇 institute of sof...
  • 53 篇 college of compu...
  • 44 篇 academy of compu...
  • 41 篇 technology cente...
  • 38 篇 jd explore acade...
  • 37 篇 school of comput...
  • 29 篇 academy of compu...
  • 26 篇 institute of inf...
  • 24 篇 institute of com...
  • 22 篇 shenzhen institu...
  • 20 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 school of electr...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 18 篇 fan heng
  • 18 篇 wu enhua
  • 18 篇 zhang libo
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 16 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 bin sheng
  • 12 篇 tian feng
  • 11 篇 qing wang
  • 11 篇 dai guozhong

语言

  • 1,409 篇 英文
  • 55 篇 其他
  • 45 篇 中文
  • 1 篇 日文
检索条件"机构=Academy of Computer Science and Software Engineering"
1508 条 记 录,以下是151-160 订阅
排序:
The Alignment between DevOps and Business Outcomes  8
The Alignment between DevOps and Business Outcomes
收藏 引用
8th International Conference on engineering and Emerging Technologies, ICEET 2022
作者: Mukange, Tsumbedzo Langerman, Josef University of Johannesburg Academy of Computer Science and Software Engineering Johannesburg South Africa
The use of software products to achieve business outcomes increases as demand for reliable and quality services increases. DevOps enables organizations to meet market demands and changing environments through much fas... 详细信息
来源: 评论
Enhancing digital business ecosystem trust and reputation with centrality measures
Enhancing digital business ecosystem trust and reputation wi...
收藏 引用
2011 Conference on Information Security for South Africa, ISSA 2011
作者: Isherwood, Donovan Coetzee, Marijke Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Digital Business Ecosystem (DBE) is a decentralised environment where very small enterprises (VSEs) and small to medium sized enterprises (SMEs) interoperate by establishing collaborations with each other. Collaborati... 详细信息
来源: 评论
The design of an identity and access management assurance dashboard model  12th
The design of an identity and access management assurance da...
收藏 引用
12th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2018 Held at the 24th IFIP World computer Congress, WCC 2018
作者: Damon, Ferdinand Coetzee, Marijke Academy for Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Executives overseeing Identity and Access Management (IAM) solutions of enterprise information systems have to manage problematic issues at business, technology and governance levels and their related trade-offs. They... 详细信息
来源: 评论
Boosting performance of virtualized desktop infrastructure with physical GPU and SPICE
收藏 引用
science China(Information sciences) 2020年 第7期63卷 236-238页
作者: Shupan LI Limin XIAO Chungang SHI Liequan CHE Changyou ZHANG Yuanzhang LI State Key Laboratory of Software Development Environment Beihang University School of Computer Science and Engineering Beihang University Beijing Jinghang Computation and Communication Research Institute Institute of Software Chinese Academy of Sciences School of Computer Science and Technology Beijing Institute of Technology
Dear editor,The virtual desktop infrastructure (VDI) is widely used by enterprises, as it can be easily deployed,has a reduced management cost, improves resource utilization, and can be accessed at any location by the... 详细信息
来源: 评论
Compositional verification of liveness property in inhibitor-arc connections of Petri net systems
Journal of Software
收藏 引用
Journal of software 2012年 第3期7卷 499-507页
作者: Pu, Fei College of Computer and Information Engineering Zhejiang Gongshang University Hangzhou China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Petri net systems synthesis can construct large systems without the requirement of reachability analysis so that it can reduce the high complexity of analyzing global system. In a synthesis process, such good properti... 详细信息
来源: 评论
Path planning of multi-robot cooperation for avoiding obstacle based on improved artificial potential field method
收藏 引用
Sensors and Transducers 2014年 第2期165卷 221-226页
作者: Zhaofeng, Yang Ruizhe, Zhang Software Engineering School of Pingdingshan University Pingdingshan Henan 467002 China Computer Science and Technic Academy Department Pingdingshan Henan 467002 China
In the process of the multi-robot collaboration, the problem of path planning is necessary to consider the barrier of static obstacles, but also to avoid collisions between the collaborative robots. This paper selecte... 详细信息
来源: 评论
An efficient quantum blind digital signature scheme
收藏 引用
science China(Information sciences) 2017年 第8期60卷 226-239页
作者: Hong LAI Mingxing LUO Josef PIEPRZYK Zhiguo QU Shudong LI Mehmet A.ORGUN College of Computer and Information Science Southwest University Information Security and National Computing Grid Laboratory School of Information Science and TechnologySouthwest Jiaotong University School of Electrical Engineering and Computer Science Queensland University of Technology Institute of Computer Science Polish Academy of Sciences School of Computer and Software Nanjing University of Information Science and Technology College of Mathematics and Information Science Shandong Technology and Business University School of Computer Science National University of Defense Technology Department of Computing Macquarie University Faculty of Information Technology Macau University of Science and Technology
Recently, many quantum digital signature(QDS) schemes have been proposed to authenticate the integration of a message. However, these quantum signature schemes just consider the situation for bit messages,and the sign... 详细信息
来源: 评论
A new probabilistic algorithm for approximate model counting and extensions for numeric domains  2
A new probabilistic algorithm for approximate model counting...
收藏 引用
2nd Workshop on Logics for Reasoning about Preferences, Uncertainty, and Vagueness, PRUV 2018
作者: Ge, Cunjing Ma, Feifei Liu, Tian Zhang, Jian Ma, Xutong State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Laboratory of Parallel Software and Computational Science Institute of Software Chinese Academy of Sciences China University of Chinese Academy of Sciences China School of Electronics Engineering and Computer Science Peking University China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences China
Constrained counting is important in domains ranging from artificial intelligence to software analysis. There are already a few approaches for counting models over various types of constraints. Recently, hashing-based...
来源: 评论
Efficient Algorithm for Energy-Aware Virtual Network Embedding
收藏 引用
Tsinghua science and Technology 2016年 第4期21卷 407-414页
作者: Shuxian Jia Guiyuan Jiang Peilan He Jigang Wu School of Computer Software Technology Zhejiang University Ningbo 315048 China School of Computer Science and Engineering Nanyang Technological University 639798 Singapore State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Network virtualization is a promising approach for resource management that allows customized Virtual Networks (VNs) to be multiplexed on a shared physical infrastructure. A key function that network virtualization ... 详细信息
来源: 评论
FM-FCN:A Neural Network with Filtering Modules for Accurate Vital Signs Extraction
收藏 引用
Research 2025年 第1期2024卷 92-106页
作者: Fangfang Zhu Qichao Niu Xiang Li Qi Zhao Honghong Su Jianwei Shuai Department of Physics and Fujian Provincial Key Laboratory for Soft Functional Materials ResearchXiamen UniversityXiamen 361005China National Institute for Data Science in Health and Medicine and State Key Laboratory of Cellular Stress BiologyInnovation Center for Cell Signaling NetworkXiamen UniversityXiamen 361005China Vitalsilicon Technology Co.Ltd. JiaxingZhejiang 314006China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan 114051China Yangtze Delta Region Institute of Tsinghua University ZhejiangJiaxing 314006China Wenzhou Institute University of Chinese Academy of SciencesWenzhou 325001China Oujiang Laboratory (Zhejiang Lab for Regenerative Medicine Vision and Brain Health)Wenzhou 325001China
Neural networks excel at capturing local spatial patterns through convolutional modules,but they may struggle to identify and effectively utilize the morphological and amplitude periodic nature of physiological *** th... 详细信息
来源: 评论